| 10771492 |
Enterprise graph method of threat detection |
Efim Hudis, Michal Braverman-Blumenstyk, Daniel Alon, Hani Hana Neuvirth, Royi Ronen |
2020-09-08 |
| 10380008 |
Identifying implicit assumptions associated with a software product |
Rui WANG, Yuchen Zhou, Shuo Chen, Shaz Qadeer |
2019-08-13 |
| 9547664 |
Selecting candidate rows for deduplication |
Yaron Zinar, Efim Hudis, Yifat Orlin, Gal Novik, Gad Peleg |
2017-01-17 |
| 9514415 |
Method and system for decomposing single-qubit quantum circuits into a discrete basis |
Alexei Bocharov, Krysta Svore |
2016-12-06 |
| 9372785 |
Identifying implicit assumptions associated with a software product |
Rui WANG, Yuchen Zhou, Shuo Chen, Shaz Qadeer |
2016-06-21 |
| 8719236 |
Selecting candidate rows for deduplication |
Yaron Zinar, Efim Hudis, Yifat Orlin, Gal Novik, Gad Peleg |
2014-05-06 |
| 8468505 |
State as a first-class citizen of an imperative language |
Wolfgang Grieskamp, Wolfram Schulte, Nikolai Tillmann |
2013-06-18 |
| 8117173 |
Efficient chunking algorithm |
Nikolaj S. Bjorner, Dan Teodosiu |
2012-02-14 |
| 7584463 |
State as a first-class citizen of an imperative language |
Wolfgang Grieskamp, Wolfram Schulte, Nikolai Tillmann |
2009-09-01 |
| 7555531 |
Efficient algorithm and protocol for remote differential compression |
Dan Teodosiu, Nikolaj S. Bjørner, Patrick E. Bozeman |
2009-06-30 |
| 7493544 |
Extending test sequences to accepting states |
Andreas Blass, Colin Campbell, Lev Borisovich Nachmanson, Margus Veanes, Michael Barnett +3 more |
2009-02-17 |
| 7149678 |
High level executable network abstract machine |
Margus Veanes, Uwe Glässer |
2006-12-12 |
| 7088864 |
Generating a test suite from an abstract state machine |
Wolfgang Grieskamp, Wolfram Schulte, Margus Veanes |
2006-08-08 |